MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam

/
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam will prepare you to pass the CISSP® Certification Exam. This course is an accelerated review course that focuses solely on the ten domains of knowledge as determined by ISC2. Test-taking tips and strategies are also discussed.

FCC Approves the use of “White Space”, What is the Security Concern?

/
On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access. White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.

“White Space” and a Possible Security Concern

/
The FCC will be ruling on the usage of “White Space” for wireless networking access today (9/23/2010). White Space is the frequencies that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.

Stuxnet was a directed attack with insider knowledge expert says

/
Stuxnet appeared on the scene earlier this summer, though it was written more than a year ago. The code, its mechanics, the way it moved from system to system using Zero-Day vulnerabilities in Windows, everything about it was both frightening and shady. The hype given to it was justified, if only because it was a targeted payload, aimed at critical infrastructure.

Twitter Mouse-Over Flaw Send Users to Dangerous Links

/
Earlier in the day a security flaw turned Twitter's Website into a chaotic and potentially unsafe place, filled with annoying pop-up windows that activated just by rolling the mouse over another user's tweets.

FCC to make ruling on “White Space” usage.

/
On September 23rd the FCC will vote on a new set of rules that will finally allow their planned “super WiFi” to become reality. In 2009 the FCC voted to open up the vast amounts of “white space” frequencies that lie between television broadcast channels.

The EnCase Evidence File Format

/
The EnCase evidence file can also be referred to as a forensic…

Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard

/
ulnerability Assessment, according to wikipedia.org, is the process of identifying and quantifying vulnerabilities in a system. Vulnerability assessment can be used against many different types of systems such as a home security alarm, the protection of a nuclear power plant or a military outpost. Note that vulnerability assessment is different from risk assessments even though they share some of the same commonalities. Vulnerability Assessment concerns itself with the identification of vulnerabilities, the possibilities of reducing those vulnerabilities and improving the capacity to manage future incidents. This paper will focus primarily on vulnerability assessment as it pertains to information technology infrastructure and how utilizing QualysGuard can ease the burden on your technology staff.

‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard

/
Last week a hacker named, "Iraq resistance" who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the "Here you have" worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.

Microsoft Security Bulletin Summary for September 2010 – Issued: September 14, 2010

/
With the release of the bulletins for September 2010, this bulletin summary replaces the bulletin advance notification originally issued on September 9, 2010. For more information about the bulletin advance notification service, see http://www.microsoft.com/technet/security/Bulletin/advance.mspx.